First published: Thu Jan 10 2019(Updated: )
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS | <11.0.2-044_md | |
Cisco AsyncOS | >=11.1.0<11.1.2-023_md | |
Cisco Email Security Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15460 is a vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA).
CVE-2018-15460 has a severity rating of 8.6 (high).
CVE-2018-15460 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition by increasing the CPU utilization to 100 percent on the affected device.
Versions up to and including 11.0.2-044_md and versions between 11.1.0 and 11.1.2-023_md of Cisco AsyncOS Software are affected.
To mitigate this vulnerability, it is recommended to upgrade to a fixed software release as per the guidance provided by Cisco in their security advisory.